7.5
CVSSv2

CVE-2017-5340

Published: 11/01/2017 Updated: 20/07/2022
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Zend/zend_hash.c in PHP prior to 7.0.15 and 7.1.x prior to 7.1.1 mishandles certain cases that require large array allocations, which allows remote malicious users to execute arbitrary code or cause a denial of service (integer overflow, uninitialized memory access, and use of arbitrary destructor function pointers) via crafted serialized data.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php

netapp clustered data ontap -

Vendor Advisories

Synopsis Moderate: rh-php70-php security, bug fix, and enhancement update Type/Severity Security Advisory: Moderate Topic An update for rh-php70-php is now available for Red Hat Software CollectionsRed Hat Product Security has rated this update as having a security impact of Moderate A Common Vulnerabilit ...
Debian Bug report logs - #850158 php70: CVE-2017-5340: Use of uninitialized memory in unserialize() Package: php70; Maintainer for php70 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php70 is src:php70 (PTS, buildd, popcon) Reported by: Henri Salo <henri@nervfi> Date: Wed, 4 Jan ...
USN-3211-1 introduced a regression in PHP ...
Several security issues were fixed in PHP ...
Integer overflow in gd_ioc in the GD Graphics Library (aka libgd) before 224 allows remote attackers to have unspecified impact via vectors involving the number of horizontal and vertical chunks in an image (CVE-2016-10168) In all versions of PHP 7, during the unserialization process, resizing the 'properties'; hash table of a serialized object ...
It was found that PHP uses uninitialized memory during calls to `unserialize()` The payload supplied to `unserialize()` may control this uninitialized memory region and thus may be used to trick PHP into operating on faked objects and calling attacker controlled destructor function pointers, effectively allowing arbitrary code execution via specia ...